network security provide short solutions 2 3 lines for all the questions in own words

Week 1 :

Describe the key security requirements of confidentiality, integrity, and availability.

Describe the X.800 security architecture for OSI.

Discuss the types of security threats and attacks that must be dealt with and give examples of the types of threats and attacks that apply to different categories of computer and network assets.

Explain the fundamental security design principles.

Discuss the use of attack surfaces and attack trees. List and briefly describe key organizations involved in cryptography standards.

Week 2:

.1 What are the essential ingredients of a symmetric cipher?

2.2 What are the two basic functions used in encryption algorithms?

2.3 How many keys are required for two people to communicate via a symmetric cipher?

2.4 What is the difference between a block cipher and a stream cipher?

2.5 What are the two general approaches to attacking a cipher?

2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?

2.7 What is triple encryption?

2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

Week 3:

Define the term message authentication code. List and explain the requirements for a message authentication code.

Explain why a hash function used for message authentication needs to be secured. Understand the differences among preimage resistant, second preimage resistant, and collision resistant properties. Understand the operation of SHA-512.

Present an overview of HMAC. Present an overview of the basic principles of public-key cryptosystems.

Explain the two distinct uses of public-key cryptosystems. Present an overview of the RSA algorithm. Define Diffie–Hellman key exchange. Understand the man-in-the-middle attack.

Week 4 :

4.1 List ways in which secret keys can be distributed to two communicating parties.

4.2 What is the difference between a session key and a master key?

4.3 What is a key distribution center?

4.4 What entities constitute a full-service Kerberos environment?

4.5 In the context of Kerberos, what is a realm?

4.6 What are the principal differences between version 4 and version 5 of Kerberos?

4.7 What is a nonce?

4.8 What are two different uses of public-key cryptography related to key distribution?

4.9 What are the essential ingredients of a public-key directory?

4.10 What is a public-key certificate?

4.11 What are the requirements for the use of a public-key certificate scheme?

4.12 What is the purpose of the X.509 standard?

4.13 What is a chain of certificates?

4.14 How is an X.509 certificate revoked?

Week 5:

5.1 Provide a brief definition of network access control.

5.2 What is an EAP?

5.3 List and briefly define four EAP authentication methods.

5.4 What is EAPOL?

5.5 What is the function of IEEE 802.1X?

5.6 Define cloud computing.

5.7 List and briefly define three cloud service models.

5.8 What is the cloud computing reference architecture?

5.9 Describe some of the main cloud-specific security threats.

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!
Use Discount Code “Newclient”for a 15% Discount!”

We have Walden University and Capella University nursing practitioners!


Buy Custom Nursing Papers

#write essay #research paper #blog writing #article writing #academic writer #reflective paper #essay pro #types of essays #write my essay #reflective essay #paper writer #essay writing service #essay writer free #essay helper #write my paper #assignment writer #write my essay for me #write an essay for me #uk essay #thesis writer #dissertation writing services #writing a research paper #academic essay #dissertation help #easy essay #do my essay #paper writing service #buy essay #essay writing help #essay service #dissertation writing #online essay writer #write my paper for me #types of essay writing #essay writing website #write my essay for free #reflective report #type my essay #thesis writing services #write paper for me #research paper writing service #essay paper #professional essay writers #write my essay online #essay help online #write my research paper #dissertation writing help #websites that write papers for you for free #write my essay for me cheap #pay someone to write my paper #pay someone to write my research paper #Essaywriting #Academicwriting #Assignmenthelp #Nursingassignment #Nursinghomework #Psychologyassignment #Physicsassignment #Philosophyassignment #Religionassignment #History #Writing #writingtips #Students #universityassignment #onlinewriting #savvyessaywriters #onlineprowriters #assignmentcollection #excelsiorwriters #writinghub #study #exclusivewritings #myassignmentgeek #expertwriters #art #transcription #grammer #college #highschool #StudentsHelpingStudents #studentshirt #StudentShoe #StudentShoes #studentshoponline #studentshopping #studentshouse #StudentShoutout #studentshowcase2017 #StudentsHub #studentsieuczy #StudentsIn #studentsinberlin #studentsinbusiness #StudentsInDubai #studentsininternational